![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | bro/ | 2016-12-26 15:59 | - | |
![]() | mitm.out | 2016-12-21 23:51 | 0 | |
![]() | 2016-12-26_win17.mitm.weblog | 2016-12-26 15:59 | 287 | |
![]() | 2016-12-26_win17.capinfos | 2016-12-26 15:59 | 1.1K | |
![]() | 2016-12-26_win17.passivedns | 2016-12-26 15:59 | 1.4K | |
![]() | 2016-12-26_win17.tcpdstat | 2016-12-26 15:59 | 1.9K | |
![]() | 2016-12-26_win17.json | 2016-12-26 16:03 | 2.5K | |
![]() | README.md | 2016-12-26 16:02 | 2.5K | |
![]() | 2016-12-26_win17.dnstop | 2016-12-26 15:59 | 2.7K | |
![]() | README.html | 2016-12-26 16:02 | 3.2K | |
![]() | 2016-12-26_win17.weblogng | 2016-12-26 15:59 | 33K | |
![]() | 2016-12-26_win17.html | 2016-12-26 16:03 | 353K | |
![]() | 1831806fc27d496f0f9dcfd8402724189deaeb5f8bcf0118f3d6484d0bdee9ed.exe.zip | 2016-12-26 16:02 | 393K | |
![]() | 2016-12-26_win17.binetflow | 2016-12-26 15:59 | 1.6M | |
![]() | 2016-12-26_win17.biargus | 2016-12-26 15:59 | 2.8M | |
![]() | 2016-12-26_win17.rrd | 2016-12-26 15:54 | 8.0M | |
![]() | 2016-12-26_win17.pcap | 2016-12-26 15:53 | 36M | |
Duration: 4 days 16:02:42
RobotHash
- Infected host: 192.168.1.127
- Default GW: 192.168.1.2
started win17
infected
The program is a type of remote desktop, so it connects to its server on port 443. But since it is a remote administration tool, the content in port 443 is not SSL/TLS, is custom.
power off